Latest Tips Articles

Installing SQL Server 2008

Need your server and your site up and running quick? Let Greg Larsen show you what you need to know to get SQL Server running and configured.

A Web Developer's Look at Windows 7

The new Windows 7 user interface features can offer Web developers significant productivity gains in terms of organizing, finding, and navigating to commonly used resources. This article introduces you to the improvements which can cut significant time from otherwise mundane daily workflow tasks.

OK-CANCEL vs CANCEL-OK

What order should the OK and Cancel buttons appear? Should it be like Windows or like the Mac? Are there any "rule of thumb" as to when certain standard should be followed or is it just a matter of taste?

OP-ED: Software Development from Core to Cosmetics

Few projects end up having too much time. Successfully completing a project often depends on tackling core, significant, and risky aspects of any custom solution first—like the long hard march up hill—and finishing with the trim, or cosmetic work, last.

Latest Developer Videos

More...

Latest CodeGuru Developer Columns

MFC Integration with the Windows Transactional File System (TxF)

The Transactional File System (TxF), which allows access to an NTFS file system to be conducted in a transacted manner through extensions to the Windows SDK API. MFC 10, has been extended to support TxF and related technologies. This support allows existing MFC applications to be easily extended to support kernel transactions.

Top White Papers and Webcasts

  • On-demand Event Event Date: September 10, 2014 Modern mobile applications connect systems-of-engagement (mobile apps) with systems-of-record (traditional IT) to deliver new and innovative business value. But the lifecycle for development of mobile apps is also new and different. Emerging trends in mobile development call for faster delivery of incremental features, coupled with feedback from the users of the app "in the wild." This loop of continuous delivery and continuous feedback is how the best mobile …

  • Targeted attacks and advanced threats are customized to infiltrate your unique IT infrastructure, evade conventional defenses, and remain hidden while stealing your corporate data. To detect these criminal intrusions, analysts and security experts agree that organizations should deploy advanced threat protection as part of an expanded security monitoring strategy. For this comparative analysis of breach detection systems, product analysis reports and comparative analysis reports are used to create the security …

Most Popular Programming Stories

More for Developers

Latest Developer Headlines

RSS Feeds